咨询与建议

限定检索结果

文献类型

  • 262 篇 会议
  • 91 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 125 篇 信息与通信工程
    • 105 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 74 篇 电子科学与技术(可...
    • 29 篇 电气工程
    • 27 篇 仪器科学与技术
    • 21 篇 控制科学与工程
    • 19 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 11 篇 机械工程
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 船舶与海洋工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 安全科学与工程
    • 4 篇 化学工程与技术
  • 110 篇 理学
    • 59 篇 数学
    • 31 篇 物理学
    • 19 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 36 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 9 篇 军事学
    • 6 篇 军队指挥学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 15 篇 simulation
  • 15 篇 feature extracti...
  • 14 篇 deep learning
  • 14 篇 bandwidth
  • 14 篇 cognitive radio
  • 13 篇 modulation
  • 8 篇 signal to noise ...
  • 8 篇 metamaterials
  • 8 篇 receivers
  • 8 篇 heuristic algori...
  • 7 篇 interference
  • 7 篇 algorithm design...
  • 7 篇 microstrip anten...
  • 7 篇 clustering algor...
  • 7 篇 sensors
  • 6 篇 optimization
  • 6 篇 time-frequency a...
  • 6 篇 location awarene...
  • 6 篇 security
  • 6 篇 estimation

机构

  • 180 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 15 篇 no.36 research i...
  • 14 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 college of infor...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 science and tech...
  • 7 篇 college of under...
  • 6 篇 no.36 research i...
  • 6 篇 university of el...
  • 6 篇 school of softwa...
  • 5 篇 state key labora...
  • 5 篇 no.36 research i...
  • 5 篇 school of inform...
  • 5 篇 school of comput...
  • 5 篇 electronic engin...
  • 5 篇 shenzhen researc...

作者

  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 20 篇 xiaoniu yang
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 wang wei
  • 9 篇 jiahao dai
  • 8 篇 wenhua ye
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 jiang bin
  • 8 篇 huan li

语言

  • 330 篇 英文
  • 15 篇 中文
  • 8 篇 其他
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory NO.36"
353 条 记 录,以下是291-300 订阅
排序:
Reconstruction failure detection for wideband spectrum sensing with modulated wideband converter based sub-Nyquist sampling
Reconstruction failure detection for wideband spectrum sensi...
收藏 引用
General Assembly and Scientific Symposium, URSI
作者: Shilian Zheng Xiaoniu Yang Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Telecommunications Engineering Xidian University Xi'an China
Modulated wideband converter (MWC) based sub-Nyquist sampling can be used for wideband spectrum sensing in cognitive radio networks. In this paper, a method is proposed for detecting whether the reconstruction process... 详细信息
来源: 评论
Robust two-factor authentication and key agreement preserving user privacy
收藏 引用
International Journal of Network security 2014年 第3期16卷 229-240页
作者: Jiang, Qi Ma, Jianfeng Li, Guangsong Yang, Li School of Computer Science and Technology Xidian University No.2 South Taibai Road Xi'an Shaanxi 710071 China Science and Technology on Communication Information Security Control Laboratory 36 Research Institute CETC Jiaxing 314033 China Department of Information Research Zhengzhou Information Science and Technology Institute No.5 Wenhua Road Zhengzhou Henan 450002 China
In this paper, we first give a new set of design goals for anonymous two-factor authentication scheme. The new set is a refinement of some previously proposed requirement sets;it not only eliminates the redundancies, ... 详细信息
来源: 评论
A secure model based on game theoretic malicious detection mechanism for MANETs
收藏 引用
Journal of information and Computational science 2014年 第2期11卷 481-491页
作者: Wang, Xiao Feng, Renjian Wu, Yinfeng Ren, Yongji Wan, Jiangwen School of Instrumentation Science and Opto-Electronics Engineering Beihang University Beijing 100191 China Department of Command Naval Aeronautical and Astronautical University Yantai 264001 China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 China
Mobile Ad Hoc network security is facing tougher challenges due to emerging purposive strategic attacks conducted by smart malicious nodes. All these purposive strategic attacks run out of the throughput which results... 详细信息
来源: 评论
Passive satellite localization using TDOA/FDOA/AOA measurements
Passive satellite localization using TDOA/FDOA/AOA measureme...
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Bin, Yang Zheng Lei, Wang Qun, Chen Pei Nan, Lu An Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China
Dual satellite TDOA/FDOA localization scheme has problems of multiple ambiguous solutions and poor localization results in the sub-satellite area along the dual satellite baseline direction. Passive localization using... 详细信息
来源: 评论
Critical nodes selection based on trust evaluation in Ad Hoc networks
收藏 引用
Tongxin Xuebao/Journal on communications 2014年 35卷 213-219页
作者: Liu, Zhuo-Chao Yang, Li Jiang, Qi Wang, Wei Cao, Chun-Jie School of Computer Science and Technology Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory The 36th Research Institute of CETC Jiaxing314033 China College of Information Science and Technology Hainan University Haikou570228 China
There are some critical nodes in Ad Hoc networks, and the failure of these critical nodes can critically affect the performance of the network. For the aim of selecting the important and trusted critical nodes in Ad H... 详细信息
来源: 评论
Hybrid Programming Based on Matlab Engine technology
Hybrid Programming Based on Matlab Engine Technology
收藏 引用
International Conference on Computer sciences and Applications (CSA)
作者: Huan Li Wenhua Ye Science Technology on Communication Iinformation Security Control Laboratory Jiaxing Zhejiang China Science Technology on Communication Iinformation Security Control Laboratory No.36 Research Institute of CETC Jiaxing Zhejiang China
In this paper, a dual language hybrid programming based on Matlab engine technology and example of implementation are described. A lot of Matlab functions can be used by this technology effectively, which reducing the... 详细信息
来源: 评论
Adaptively secure key-policy ABE scheme with fast decryption
收藏 引用
Tongxin Xuebao/Journal on communications 2014年 35卷 26-32页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Faculty of Software Fujian Normal University Fuzhou350108 China School of Telecommunication Engineering Xidian University Xi'an710071 China
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc... 详细信息
来源: 评论
Passive satellite localization using TDOA/FDOA/AOA measurements
Passive satellite localization using TDOA/FDOA/AOA measureme...
收藏 引用
IEEE Conference Anthology
作者: Yang Zheng Bin Wang Lei Chen Pei Qun Lu An Nan Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang China
Dual satellite TDOA/FDOA localization scheme has problems of multiple ambiguous solutions and poor localization results in the sub-satellite area along the dual satellite baseline direction. Passive localization using... 详细信息
来源: 评论
Virtex-7 FPGA-Based High-Speed Signal Processing Hardware Platform Design
Virtex-7 FPGA-Based High-Speed Signal Processing Hardware Pl...
收藏 引用
2013 IEEE 4th International Conference on Electronics information and Emergency communication
作者: Wenhua Ye Huan Li Science Technology on Communication Iinformation Security Control Laboratory No.36 Research Institute of CETC
With the development of digital signal processing technology, the demand on the signal processor speed has become increasingly high. This paper describes the high-speed signal processing hardware platform design. Ther... 详细信息
来源: 评论
Implementation of arbitrary waveform generator using direct RF synthesis
Implementation of arbitrary waveform generator using direct ...
收藏 引用
2012 5th Global Symposium on Millimeter-Waves, GSMM 2012
作者: Zhao, Yun Wang, LiJun Xu, JianLiang Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China No.36 Research Institute of CETC Jiaxing Zhejiang 314033 China
Along with the DAC technology evolved, it is possible to implement direct RF synthesis using exclusively digital technologies and it promote the rapid progress of transmitter technology for software defined radio (SDR... 详细信息
来源: 评论